Sciweavers

398 search results - page 59 / 80
» Granularity Control for Distributed Execution of Logic Progr...
Sort
View
MIDDLEWARE
2004
Springer
15 years 2 months ago
Application partitioning and hierarchical management in grid environments
Several works on grid computing have been proposed in the last years. However, most of them, including available software, can not deal properly with some issues related to contro...
Patrícia Kayser Vargas, Inês de Castr...
114
Voted
AAMAS
1999
Springer
14 years 9 months ago
Verifying Compliance with Commitment Protocols
Interaction protocols are specific, often standard, constraints on the behaviors of autonomous agents in a multiagent system. Protocols are essential to the functioning of open sys...
Mahadevan Venkatraman, Munindar P. Singh
HLPPP
1991
15 years 1 months ago
Reasoning About Synchronic Groups
Swarm is a computational model which extends the UNITY model in three important ways: (1) UNITY’s fixed set of variables is replaced by an unbounded set of tuples which are add...
Gruia-Catalin Roman, H. Conrad Cunningham
ISLPED
2004
ACM
124views Hardware» more  ISLPED 2004»
15 years 3 months ago
The design of a low power asynchronous multiplier
In this paper we investigate the statistics of multiplier operands and identify two characteristics of their distribution that have important consequences for the design of low po...
Yijun Liu, Stephen B. Furber
132
Voted
WCRE
2010
IEEE
14 years 7 months ago
Reverse Engineering Self-Modifying Code: Unpacker Extraction
—An important application of binary-level reverse engineering is in reconstructing the internal logic of computer malware. Most malware code is distributed in encrypted (or “pa...
Saumya K. Debray, Jay Patel